3,301 research outputs found

    Method for attaching a fused-quartz mirror to a conductive metal substrate

    Get PDF
    A fused-quartz mirror is attached to a conductive metal substrate by the following steps: tinning one surface of a fused-quartz mirror with a solder of substantially pure indium; tinning a metallic substrate with an indium eutectic alloy consisting essentially of indium bismuth, lead and tin having a melting point substantially below that of indium; heating the eutectic alloy to a temperature substantially above its melting point, but below that of the solder; floating the mirror into place, and subsequently cooling the alloy to a temperature substantially below its melting point

    A relationship analysis of restaurant inspection violations, employee behaviors, and inspection grades

    Full text link
    The purpose of the paper is to determine whether employee behaviors or non-employee behaviors have a more significant effect on health inspection grades given by the Southern Nevada Health District. As foodborne illness outbreaks continue to rise, discovering whether the violations stem from employee behaviors or from items not related to employee behavior is essential. The results will be useful for both industry and academics in helping to establish a means for understanding where violations occur within food establishments; 205 restaurant health inspections were collected with grades other than \u27A\u27. Behavior based violations had a higher impact on the grade. Significant indicators (with marginal effect) that affect health inspection grades include: approved sources (48.76%), proper refrigeration (69.33%), clean & sanitize kitchen utensils (61.6%), storage (34.13%), & hygienic practices (55.47%); The results of this study could be used to create training modules which will hopefully be used to improve inspection grades

    Coherent π^0 photoproduction on the deuteron up to 4 GeV

    Get PDF
    The differential cross section for ^2H(γ,d)π^0 has been measured at deuteron center-of-mass angles of 90° and 136°. This work reports the first data for this reaction above a photon energy of 1 GeV, and permits a test of the apparent constituent counting rule and reduced nuclear amplitude behavior as observed in elastic ed scattering. Measurements were performed up to a photon energy of 4.0 GeV, and are in good agreement with previous lower energy measurements. Overall, the data are inconsistent with both constituent-counting rule and reduced nuclear amplitude predictions

    Measurement of neutrino oscillation with KamLAND: Evidence of spectral distortion

    Get PDF
    We present results of a study of neutrino oscillation based on a 766 ton/year exposure of KamLAND to reactor antineutrinos. We observe 258 v_e candidate events with energies above 3.4 MeV compared to 365.2±23.7 events expected in the absence of neutrino oscillation. Accounting for 17.8±7.3 expected background events, the statistical significance for reactor v_e over bar (e) disappearance is 99.998%. The observed energy spectrum disagrees with the expected spectral shape in the absence of neutrino oscillation at 99.6% significance and prefers the distortion expected from v_e oscillation effects. A two-neutrino oscillation analysis of the KamLAND data gives Δm^2=7.9_(-0.5)^(+0.6)x10^(-5) eV^2. A global analysis of data from KamLAND and solar-neutrino experiments yields Δm^2=7.9_(-0.5)^(+0.6)x10^(-5) eV^2 and tan^2θ=0.40_(-0.07)^(+0.10), the most precise determination to date

    High Sensitivity Search for v_e’s from the Sun and Other Sources at KamLAND

    Get PDF
    Data corresponding to a KamLAND detector exposure of 0.28 kton yr has been used to search for ν̅ _e’s in the energy range 8.3 < E_(ν̅e) < 14.8  MeV. No candidates were found for an expected background of 1.1±0.4 events. This result can be used to obtain a limit on ν̅_e fluxes of any origin. Assuming that all ν̅_e flux has its origin in the Sun and has the characteristic ^8B solar ν_e energy spectrum, we obtain an upper limit of 3.7×10^2  cm^(-2) ^(s-1) (90% C.L.) on the ν̅_e flux. We interpret this limit, corresponding to 2.8×10^(-4) of the standard solar model ^8B ν_e flux, in the framework of spin-flavor precession and neutrino decay models

    Online Admission Control and Embedding of Service Chains

    Full text link
    The virtualization and softwarization of modern computer networks enables the definition and fast deployment of novel network services called service chains: sequences of virtualized network functions (e.g., firewalls, caches, traffic optimizers) through which traffic is routed between source and destination. This paper attends to the problem of admitting and embedding a maximum number of service chains, i.e., a maximum number of source-destination pairs which are routed via a sequence of to-be-allocated, capacitated network functions. We consider an Online variant of this maximum Service Chain Embedding Problem, short OSCEP, where requests arrive over time, in a worst-case manner. Our main contribution is a deterministic O(log L)-competitive online algorithm, under the assumption that capacities are at least logarithmic in L. We show that this is asymptotically optimal within the class of deterministic and randomized online algorithms. We also explore lower bounds for offline approximation algorithms, and prove that the offline problem is APX-hard for unit capacities and small L > 2, and even Poly-APX-hard in general, when there is no bound on L. These approximation lower bounds may be of independent interest, as they also extend to other problems such as Virtual Circuit Routing. Finally, we present an exact algorithm based on 0-1 programming, implying that the general offline SCEP is in NP and by the above hardness results it is NP-complete for constant L.Comment: early version of SIROCCO 2015 pape

    A Case Study of Strategic Metrics Use in a CMM-Based Outsourcing Environment

    Get PDF
    IT firms that specialize in outsourcing must provide assurances to their customers that they are adding value to that business relationship. The purpose of this paper is to describe a practical set of metrics that are focused on customer satisfaction and that are easily understood by both customer and developer organizations. The metrics established by Keane, Inc., a large US-based IT services firm, are based upon the goals and concepts of the Software Engineering Institute\u27s (SEI) Capability Maturity Model (CMM®) for software

    Q^2 Evolution of the Neutron Spin Structure Moments using a ^3He Target

    Get PDF
    We have measured the spin structure functions g_1 and g_2 of ^3He in a double-spin experiment by inclusively scattering polarized electrons at energies ranging from 0.862 to 5.058 GeV off a polarized ^3He target at a 15.5° scattering angle. Excitation energies covered the resonance and the onset of the deep inelastic regions. We have determined for the first time the Q^2 evolution of Γ_1(Q^2)=∫_0^1g_1(x,Q^2)dx, Γ_2(Q^2)=∫_0^1g_2(x,Q^2)dx, and d_2(Q^2)=∫_0^1x^2[2g_1(x,Q^2)+3g_2(x,Q^2)]dx for the neutron in the range 0.1 ≤ Q^2 ≤0.9  GeV^2 with good precision. Γ_1(Q^2) displays a smooth variation from high to low Q^2. The Burkhardt-Cottingham sum rule holds within uncertainties and d_2 is nonzero over the measured range

    Programming Protocol-Independent Packet Processors

    Full text link
    P4 is a high-level language for programming protocol-independent packet processors. P4 works in conjunction with SDN control protocols like OpenFlow. In its current form, OpenFlow explicitly specifies protocol headers on which it operates. This set has grown from 12 to 41 fields in a few years, increasing the complexity of the specification while still not providing the flexibility to add new headers. In this paper we propose P4 as a strawman proposal for how OpenFlow should evolve in the future. We have three goals: (1) Reconfigurability in the field: Programmers should be able to change the way switches process packets once they are deployed. (2) Protocol independence: Switches should not be tied to any specific network protocols. (3) Target independence: Programmers should be able to describe packet-processing functionality independently of the specifics of the underlying hardware. As an example, we describe how to use P4 to configure a switch to add a new hierarchical label
    • …
    corecore